Professional Documents
Culture Documents
JAMMER
By
IRFAN KHAN
SAJID KHAN
Thesis submitted to the faculty Islamia College University Peshawar
Department of Electronics and Telecommunication in partial fulfillment
Of requirements for the Degree of B.Sc (Hons)
Electronics
XYZ, 2016.
Declaration of Originality
We hereby declare that the work contained in this thesis and the intellectual content of this thesis
are the product of our own work. This thesis has not been previously published in any form nor
does it contain any verbatim of the published resources which could be treated as infringement of
the international copyright law.
We also declare that we do understand the terms copyright and plagiarism, and that in case of
any copyright violation or plagiarism found in this work, we will be held fully responsible of the
consequences of any such violation.
Signature: ___________________________
Signature: ___________________________
Date: _______________
Certificate of Approval
This is to certify that the work contained in this thesis
entitled
IRFAN KHAN
SAJID KHAN
Under my supervision and that in my opinion, it is fully
adequate, in scope and quality, for the degree of B.Sc
(Hons) Electronics from
Islamia College University Peshawar
Approved By:
Signature: ________________________
Supervisor: MRS. NUMAN SAIB
Verified By:
Signature: ________________________
Director, Department of Electronics and
Telecommunication
Stamp:
Dedication
Acknowledgement
We wish to express our sincere gratitude to the respected supervisor MRS. NUMAN SAIB for
providing us an opportunity to work on this project. It was a pleasure working with him.
IRFAN KHAN
SAJID KHAN
Abstract
This report presents the design, implementation, and testing of a dual-band cell-phone jammer.
This jammer works at GSM 900 and GSM 1800 simultaneously and thus jams the four wellknown carriers in Pakistan (Mobolink, Telenor, Zong and Ward). This project complete through
two phases:
Phase one: Studying the GSM-system to find the best jamming technique, establishing the
system design and selecting suitable components.
Phase two: Buying all the needed components, drawing the overall schematics, fabricating the
PCB layout, assembling the devices, performing some measurements and finally testing the
mobile jammer.
The designed jammer was successful in jamming the four signals.
Table of Contents
Introduction 9
Jamming Techniques
1.Spoofing
10
10
2. Shielding Attacks
10
3. Denial of Service
10
Design Parameters
11
11
2. IF Section
11
11
12
12
13
3. RF Section 14
Our Project Hardware 15
1. The Arduino Uno Board 15
2. LCD Display Unit 19
3. Relay 19
4. Antenna
20
5. Jammer circuit
Description of Jammer Circuit
Mobile Jammer Working
21
22
11
24
Conclusion 26
References
27
1: Introduction
Cell phone jammer is a device that intentionally tries to restrict the mobile communication with physical
transmission. It basically blocks the phone from transmitting and receiving signal to base station. In
todays world major communication is occurs through mobile. Mobile jammer played an important role in
controlling the usage of cellular phone to accomplish a cultural society.
Communication jamming devices were first developed and used by military. This interest comes from the
fundamental objective of denying the successful transport of information from the sender (tactical
commanders) to the receiver (the army personnel), and vice-versa. Nowadays, mobile (or cell) phones are
becoming essential tools in our daily life. Here in Pakistan, for example, with a rather low population
(around 50 million), four main cell phone carriers are available namely (Mobolink, Telenor,Zong,Warid)
These company use GSM 900-1800 system. Needless to say, the wide use of mobile phones could create
some problems as the sound of ringing becomes annoying or disrupting. This could happen in some
places like conference rooms, law courts, libraries, lecture rooms and mosques. One way to stop these
disrupting ringings is to install a device in such places which will inhibit the use of mobiles, i.e., make
them stop. Such a device is known as cell phone jammer or "GSM jammer", which is basically some kind
of electronic counter measure device. The technology behind cell phone jamming is very simple. The
jamming device broadcasts an RF signal in the frequency range reserved for cell phones that interferes
with the cell phone signal, which results in a "no network available" display on the cell phone screen. All
phones within the effective radius of the jammer are silenced. It should be mentioned that cell phone
jammers are illegal devices in most countries.
Designed to block or jam wireless transmissions is prohibited". However, recently, there has been an
increasing demand for portable cell phone jammers. We should mention that this project, presented in this
report, is solely done for educational purposes. In this project, a device that will jam both GSM 900 and
GSM 1800 services will be designed, built, and tested.
2: Jamming Techniques:
Most commercial jammer works on the base of noise signal attack. In jammer, the transmitter transmits a
noise signal with more power and that specific frequency as used by GSM system. Voltage controlled
oscillator is used to generate the jamming frequency
There are several ways to jam an RF device. The three most common techniques can be categorized as
follows,
1. Spoofi ng
In this kind of jamming, the device forces the mobile to turn off itself. This type is very difficult to be
implemented since the jamming device first detects any mobile phone in a specific area, then the device
sends the signal to disable the mobile phone. Some types of this technique can detect if a nearby mobile
phone is there and sends a message to tell the user to switch the phone to the silent mode (Intelligent
Beacon Disablers).
2. Shielding Attacks
This is known as TEMPEST or EMF shielding. This kind requires closing an area in a faraday cage so
that any device inside this cage cannot transmit or receive RF signal from outside of the cage. This area
can be as large as buildings.
3. Denial of Service
This technique is referred to DOS. In this technique, the device transmits a noise signal at the same
operating frequency of the mobile phone in order to decrease the signal-to-noise ratio (SNR) of the
mobile under its minimum value. This kind of jamming technique is the simplest one since the device is
always on. Our device is of this type.
3: Design Parameters
Based on the above, our device which is related to the DOS technique is transmitting noise on the same
frequencies of the two bands GSM 900 MHz, and GSM 1.8 GHz (known also as DCS 1800 band). We
focused on some design parameters to establish the device specifications. These parameters are as
follows,
and the distance D. Our design is established upon D=10 meters for DCS 1800 band and D=20 meters for
GSM 900 band.
where: Pj=jammer power, Gjr= antenna gain from jammer to receiver, Grj=antenna gain from receiver to
jammer, Rtr=range between communication transmitter and receiver, Br=communication receiver
bandwidth, Lr =communication signal loss, Pt=transmitter power, Gtr= antenna gain from transmitter to
receiver, Grt=antenna gain from receiver to transmitter, Rjr=range between jammer and communication
receiver, Bj=jammer bandwidth, and Lj=jamming signal loss. For GSM, the specified system SNR min is
9 dB which will be used as the worst case scenario for the jammer. The maximum power at the mobile
device Pr is -15 dBm.
The maximum free space loss (worst case F) happens when the maximum
frequency is used in the above equation. Using 1880 MHz gives:
F (dB) =32.44+20 log 0.01 + 20 log 1880 which gives F =58 dB.
Transformer: Is used to transform the 220VAC to other levels of voltages.i.e 220ac to 12v or 5v ac
Rectifi cation: This part is to convert the AC voltage to a DC one. We have two methods for rectification:
Half wave-rectification: The output voltage appears only during positive cycles of the input signal.
minimum desired frequency to a maximum. The tuning signal is generated by a triangular wave mixed
with noise.
importantly, it should cover the bands that we need, secondly, it should be readily available at low cost,
and finally, it should run at low power consumption. Moreover, we need to minimize the size of GSMjammer. So, we started to search through the internet for VCO's that work for GSM 900 & GSM 1800
bands.
Antenna
Is used to transmit the signal to a certain area and used to requirement but here we used high range
antenna
1.
2.
3.
4.
5.
Technical specs
Microcontroller
ATmega328P
Operating Voltage
5V
7-12V
6-20V
20 mA
50 mA
Flash Memory
32 KB (ATmega328P)
of which 0.5 KB used by bootloader
SRAM
2 KB (ATmega328P)
EEPROM
1 KB (ATmega328P)
Clock Speed
16 MHz
LED_BUILTIN
13
Length
68.6 mm
Width
53.4 mm
Weight
25 g
Programming
The Arduino/Genuine Uno can be programmed with the (Arduino Software (IDE)). Select
"Arduino/Genuine Uno from the Tools > Board menu (according to the microcontroller on your board).
For details, see the reference and tutorials.
The ATmega328 on the Arduino/Genuine Uno comes preprogrammed with a boot loader that allows you
to upload new code to it without the use of an external hardware programmer. It communicates using the
original STK500 protocol (reference, C header files).
You can also bypass the boot loader and program the microcontroller through the ICSP (In-Circuit Serial
Programming) header using Arduino ISP or similar; see these instructions for details.
The ATmega16U2 (or 8U2 in the rev1 and rev2 boards) firmware source code is available in the Arduino
repository. The ATmega16U2/8U2 is loaded with a DFU boot loader, which can be activated by:
On Rev1 boards: connecting the solder jumper on the back of the board (near the map of Italy) and then
rise in the 8U2.
On Rev2 or later boards: there is a resistor that pulling the 8U2/16U2 HWB line to ground, making it
easier to put into DFU mode.
You can then use Atmel's FLIP software (Windows) or the DFU programmer (Mac OS X and Linux) to
load a new firmware. Or you can use the ISP header with an external programmer (overwriting the DFU
boot loader). See this user-contributed tutorial for more information.
Warnings
The Arduino/Genuine Uno has a resettable polyfuse that protects your computer's USB ports from shorts
and over current. Although most computers provide their own internal protection, the fuse provides an
extra layer of protection. If more than 500 mA is applied to the USB port, the fuse will automatically
break the connection until the short or overload is removed.
Power
The Arduino/Genuine Uno board can be powered via the USB connection or with an external power
supply. The power source is selected automatically.
External (non-USB) power can come either from an AC-to-DC adapter (wall-wart) or
battery. The adapter can be connected by plugging a 2.1mm center-positive plug
into the board's power jack. Leads from a battery can be inserted in the GND and
Vin pin headers of the POWER connector.
The board can operate on an external supply from 6 to 20 volts. If supplied with less than 7V, however,
the 5V pin may supply less than five volts and the board may become unstable. If using more than 12V,
the voltage regulator may overheat and damage the board. The recommended range is 7 to 12 volts.
The power pins are as follows:
VIN The input voltage to the Arduino/Genuine board when it's using an external power source (as
opposed to 5 volts from the USB connection or other regulated power source). You can supply voltage
through this pin, or, if supplying voltage via the power jack, access it through this pin.
5V.This pin outputs a regulated 5V from the regulator on the board. The board can be supplied with
power either from the DC power jack (7 - 12V), the USB connector (5V), or the VIN pin of the board (712V). Supplying voltage via the 5V or 3.3V pins bypasses the regulator, and can damage your board. We
don't advise it.3V3. A 3.3 volt supply generated by the on-board regulator. Maximum current draw is
50mA.GND. Ground pins.IOREF. This pin on the Arduino/Genuine board provides the voltage reference
with which the microcontroller operates. A properly configured shield can read the IOREF pin voltage
and select the appropriate power source or enable voltage translators on the outputs to work with the 5V
or 3.3V.
Memory
The ATmega328 has 32 KB (with 0.5 KB occupied by the boot loader). It also has 2 KB of SRAM and 1
KB of EEPROM (which can be read and written with the EEPROM library).
Serial: 0 (RX) and 1 (TX). Used to receive (RX) and transmit (TX) TTL serial data. These pins are
connected to the corresponding pins of the ATmega8U2 USB-to-TTL Serial chip.
External Interrupts: 2 and 3. These pins can be configured to trigger an interrupt on a low value, a rising
or falling edge, or a change in value. See the attach Interrupt () function for details.PWM: 3, 5, 6, 9, 10,
and 11. Provide 8-bit PWM output with the analog Write () function.SPI: 10 (SS), 11 (MOSI), 12 (MISO),
13 (SCK). These pins support SPI communication using the SPI library.LED: 13. There is a built-in LED
driven by digital pin 13. When the pin is HIGH value, the LED is on, when the pin is LOW, it's off.TWI:
A4 or SDA pin and A5 or SCL pin. Support TWI communication using the Wire library. The Uno has 6
analog inputs, labeled A0 through A5, each of which provide 10 bits of resolution (i.e. 1024 different
values). By default they measure from ground to 5 volts, though is it possible to change the upper end of
their range using the AREF pin and the analog Reference () function.
There are a couple of other pins on the board:AREF. Reference voltage for the analog inputs. Used with
analog Reference ().Reset. Bring this line LOW to reset the microcontroller. Typically used to add a reset
button to shields which block the one on the board.
Relay
Relay is an electromagnetic device which is used to isolate two circuits electrically and connect them
magnetically. They are very useful devices and allow one circuit to switch another one while they are
completely separate. They are often used to interface an electronic circuit (working at a low voltage) to an
electrical circuit which works at very high voltage. For example, a relay can make a 5V DC battery circuit
to switch a 230V AC mains circuit. Thus a small sensor circuit can drive, say, a fan or an electric bulb.
A relay switch can be divided into two parts: input and output. The input section has a coil which
generates magnetic field when a small voltage from an electronic circuit is applied to it. This voltage is
called the operating voltage. Commonly used relays are available in different configuration of operating
voltages like 6V, 9V, 12V, 24V etc. The output section consists of contactors which connect or disconnect
mechanically. In a basic relay there are three contactors: normally open (NO), normally closed (NC) and
common (COM). At no input state, the COM is connected to NC. When the operating voltage is applied
the relay coil gets energized and the COM changes contact to NO. Different relay configurations are
available like SPST, SPDT, and DPDT etc, which have different number of changeover contacts. By
using proper combination of contactors, the electrical circuit can be switched on and off. Get inner details
about structure of a relay switch.
Antenna
Whip antennas
Devices designed for wireless machine-to-machine (M2M) communications for example, from a router
to your PC typically use external whip antennas. Whip antennas are generally wideband, not easily
detuned, and easily integrated into a wireless design. Being externally mounted, they are commonly used
in commercial applications, but rarely any longer in portable designs.
Pulse Electronics W1030 (see Figure 4) is a quarter-wave whip antenna designed for WLAN devices.
The W1030 exhibits 2.0 dib gain from 2.4 to 2.5 GHz with a VSWR of less than 2.0 and a nominal
impedance of 50?, making it well-suited for Wi-Fi, Bluetooth, ZigBee, and industrial applications that use
that band.
IF Section
Antenna Connector
Channel Output LED
//////////////LCD PINS/////////////////////
Void loop ()
{
Int f = digital Read (AO);
Conclusion
Every device is acts as good aspects as well as bad aspects. In many place cell phones jammer is
useful but at many place it is a problem. Jamming is seen as property theft, safety hazard. But its
overall performance is very good and helpful in our life. To maintain the complete silence in
library and lecture hall. To avoid fraud in examination hall. For, providing security in business
conference, board of directors rooms, seminars, etc.For providing calm and peaceful atmosphere
in Hospitals. Church/Mosques/Cathedral/Temple/Religious establishment during a hostage
situation, police can control when and where a captor can make a phone call. Police can block
phone calls during a drug raid so suspects can't communicate outside the area. Jammers can be
used in areas where radio transmissions are dangerous, (areas with a potentially explosive
atmosphere), such as chemical storage facilities or grain elevators. Corporations use jammers to
stop corporate espionage by blocking voice transmissions and photo transmissions from camera
phones.
References
1. Rick Hartley, RF / Microwave PC Board Design and Layout, Avionics Systems.
2. John Scourias, Overview of the Global System for Mobile Communications, University of
Waterloo.
3. Ahmed Jisrawi, "GSM 900 Mobile Jammer", undergrad project, JUST, 2006.
4. Limor Fried, Social Defense Mechanisms: Tools for Reclaiming our Personal Space.
5. Siwiak, K., Radio-wave propagation and Antennas for personal communication.
6. Pozar, D., Microwave Engineering, John Wiley and Sons, 2005.
7. "FREQUENCY PLANNING AND FREQUENCY COORDINATION FOR THE GSM 900,
GSM 1800, E-GSM and GSM-R LAND MOBILE SYSTEMS (Except direct mode operation
(DMO) channels)" by Working Group Frequency Management" (WGFM).
8. Tony Van Ron, 555 timer tutorial.